Towards a BPM Cloud Architecture with Data and Activity Distribution

Size: px
Start display at page:

Download "Towards a BPM Cloud Architecture with Data and Activity Distribution"

Transcription

1 2012 IEEE 16th International Enterprise Distributed Object Computing Conference Workshops Towards a BPM Cloud Architecture with and Activity Distribution Evert F. Duipmans University of Twente Enschede, The Netherlands e.f.duipmans@student.utwente.nl Luís Ferreira Pires University of Twente Enschede, The Netherlands l.ferreirapires@utwente.nl Luiz O. Bonino da Silva Santos BiZZdesign Enschede, The Netherlands l.bonino@bizzdesign.nl Abstract Nowadays, many organizations use BPM for capturing and monitoring their business processes. The introduction of BPM in an organization may become expensive, because of the upfront investments on software and hardware. Therefore, organizations can choose for a cloud-based BPM system, in which a BPM system can be used in a pay-peruse manner. Opting for cloud-based solutions may normally raise concerns in organizations such as privacy, security, legal constraints and control. By combining cloud-based and traditional BPM, organizations can benefit from the best of both worlds. This paper proposes a distribution solution in which a business process is separated into individual business processes to be executed in the cloud and on-premise. This solution gives users the freedom to place sensitive data and non-computation-intensive activities within the borders of their organization, whereas less sensitive data and computationintensive activities can be placed in the cloud. In our proposed approach, the business processes for both on-premise and the cloud are created by performing a transformation on the original business processes, guided by a distribution list in which the placement of each activity and data element is defined. This paper discusses the challenges of implementing this transformation. Keywords-BPM; cloud computing; process transformation; sensitive data; data distribution; activity distribution I. INTRODUCTION Business Process Management (BPM) [1] has gained a lot of popularity in the last two decades. By applying BPM, organizations embrace a methodology for managing and optimizing their business processes. A business process consists of activities, which are performed by either humans or information systems. A Business Process Management System (BPMS) consists, amongst others, of a process engine, in which instances of a business process are coordinated and monitored. The introduction of the Service-Oriented Architecture (SOA) paradigm [2] has led to increased use of BPM, especially since the SOA paradigm provides standardized interfaces for defining services and communication between services. Consequently, executable process languages such as WS-BPEL [3], have been introduced for describing executable business processes that integrate existing services. Purchasing a BPM system can be an expensive investment for a company. Not only the software itself needs to be purchased, but also hardware is required on which the process engine should run, and personnel needs to be hired for setting up and maintaining the hardware. In addition, scalability can be a concern for companies that use BPM, since a process engine is only able to coordinate a limited number of business process instances simultaneously. As a consequence, organizations might need to purchase additional servers, to ensure that all their customers can be served during peak load situations. Especially when these additional servers are only rarely needed, buying and maintaining the servers might become expensive. Cloud computing [4] gives users the opportunity of using computing resources in a pay-per-use manner and perceiving these resources as unlimited. The NIST definition of cloud computing [5] mentions three service models for cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS). For example, organizations may choose for cloud-based BPM systems, in which a BPM system is offered as a service (SaaS), over the Internet. Instead of having to buy hardware and software, the BPM system can be used in a pay-per-use manner. This cloud solution should also offer scalability to the organization, so that in peak load situations, additional resources can be instantiated relatively easily, and when the rush is over, the additional resources can be released. However, the fear for losing or exposing sensitive data by placing these data in the cloud is one of the biggest obstacles to the deployment of cloud-based solutions in organizations nowadays. In this paper we investigate an architecture based on [6], in which traditional BPM is combined with cloud-based BPM. By splitting up a business process into individual collaborating processes to be executed on-premise and in the cloud, organizations can place their sensitive data and non-computation-intensive activities within the borders of the organization, whereas non-sensitive data and scalable activities can be placed in the cloud. In our approach, the original (monolithic) business process is transformed according to a user-defined activity distribution list. This gives organizations the possibility of distributing activities and data in a controlled way, depending of performance and sensitivity requirements. This paper introduces and justifies this approach and also identifies the technical challenges of automating the proposed transformation /12 $ IEEE DOI /EDOCW

2 The reminder of this paper is organized as follows. Section II identifies the benefits and challenges of BPM in the cloud, by identifying the general and the specific problems for each of the service models. Section III proposes an architecture in which cloud-based BPM is combined with traditional BPM. Section IV discusses the transformation we propose in our work. Section V introduces an example, on which the transformations are performed. Section VI discusses related work and Section VII draws our conclusions. II. BPM IN THE CLOUD protection is the biggest obstacle regarding cloudbased BPM. By using a public cloud-based BPM solution, the process engine, activities and all the data that is used in the process is stored in the cloud. Sensitive data protection is no longer in hands of the organization itself, but instead, the cloud provider is now responsible for guaranteeing the safety of the data. For many organizations, this is a reason for not using cloud-based BPM solutions, simply because of policies specified by the management of the organization, or because of governmental regulations that have to be followed. Furthermore, not all the activities involved in a business process can benefit from cloud computing. Noncomputation-intensive activities might even become more expensive when being placed in the cloud [6]. For example, an activity that processes some data might take longer to execute in the cloud, since the data that needs to be processed by the activity has to be uploaded to the cloud first. This activity may not only take longer to execute, even the costs can become higher, since data might need to be exchanged between the cloud and the organization, and data transfer is one of the billing factors of cloud computing. In [7], the consequences of moving an executable business process onto one of the service models of cloud computing has been investigated. Fig. 1 shows that the responsibilities for both the cloud provider and the cloud user change when a business process is used in each service model. We give an overview of the requirements and challenges that have to be faced when moving an application to one of the service models, as identified in [7]. In the IaaS service model, the cloud user is responsible for the operating system, the middleware and the applications running in the virtual machine. Only the hardware is managed by the cloud provider. A cloud provider offers to a cloud user a virtual machine, on which the user can install an operating system and software. Each cloud user has its own virtual machine, which means that there is no sharing of virtual machines among multiple users. The installation of a process engine is performed by the cloud user, and is comparable to the installation of a process engine onpremise. In addition to on-premise installation, the cloud user might need to take additional security measures, such as Provider User User Provider Provider Application layer (process models, process instances) Middleware layer (process engine, DBMS) OS layer Hardware layer Application layer (process models, process instances) Middleware layer (process engine, DBMS) OS layer (a) Infrastructure as a Service Application layer (process models, process instances) Middleware layer (process engine, DBMS) OS layer Hardware layer Hardware layer (b) Platform as a Service (c) Software as a Service Figure 1. Responsibilities for cloud providers and cloud users for each of the service models of cloud computing, based on [7]. blocking ports, enforcing access control policies and keeping the software and operating systems up to date. In the PaaS service model, the hardware, operating system and middleware including the process engine are offered by the cloud provider. The cloud provider is therefore responsible for the process engine. A cloud user can deploy a business process by uploading the specification of the process to the cloud. The process engine might be shared among multiple cloud users, since it is part of the platform. The responsibility of data storage and data management is no longer in hands of the cloud user, which leads to several security issues. In order to offer a secure BPEL engine in the PaaS service model, several security measures have to 166

3 be taken. Process models should be encrypted, to ensure that intruders cannot read or alter process models. By signing a process model, cloud users can ensure that a process model is only valid for a particular process engine. Whenever an intruder obtains a signed process model, this model cannot be deployed on a different engine. Process engines often use an underlying base Management System (DBMS) for storing the process structure and the state of each process instance. The process data stored in the database also has to be encrypted, in order to be unreadable for intruders. In the SaaS service model, cloud providers are responsible for the hardware, operating system, middleware and the applications running in the cloud. The business process of a cloud user is no longer part of the users organization, but is instead completely offered by the cloud provider. The process is offered to multiple users and can be offered either as a single-tenant, or as a multi-tenant architecture. In a multi-tenant architecture, a business process is used by multiple users, whereas in a single-tenant architecture a process engine is deployed for each tenant and for each process model. In multi-tenant architectures, protection of data is an issue, since data of multiple users is stored in the same database. As a solution, providers can choose to store data for each user in a separate database, or to add a column to each database table where the identifier that uniquely identifies the tenant is stored. III. CONTROLLED DECOMPOSITION In [6], four distribution patterns for the process engine, activities and data are identified, as shown in Figure 2. The first pattern corresponds to the traditional on-premise BPM solution and the fourth pattern is a pure cloud-based BPM solution. In the second and third pattern, the process is coordinated from either the end-user side, or from the cloud side. In our work, we identified a fifth pattern in which process engines are explicitly placed on both sides. The architecture proposed in [6] also considers that process engines can be placed on both sides, but the decomposition of the original monolithic process onto cooperating on-site and cloud processes is not addressed in [6]. In our approach, we want to make use of two separate process engines to minimize the amount of data that has to be exchanged between the cloud and on-premise. A process engine regulates both the control-flow and data-flow of a process. Consider a process in which some activities are executed in the cloud, whereas the process engine executes on-premise. In case the generated by an activity is the of the next activity, when the execution of the first activity is finished, the data of this activity is first sent to the process engine, which in turn, sends the data to the next activity. This problem is visualized in Fig. 3. By introducing a second process engine, we can avoid this problem. do not have to send their data from cloud On-Premise (a) Traditional BPM (b) On-premise BPM with cloud distribution Cloud (c) Cloud BPM with on-premise distribution (d) Cloud BPM (e) Combined Figure 2. Distribution patterns based on [6], extended with process decomposition. Figure 3. On-Premise a1 Cloud Schematic representation of a process with one coordinator. to on-premise, or vice versa, since the coordination can be performed by the process engine placed on the same side as these related activities. Using two process engines also implies that the business process should be decomposed into at least two separate business processes. Decomposition of business processes has been studied in, for example, [8, 9, 10]. The reason for a2 a3 a4 167

4 a1 a1 Orchestration Orchestration On-premise Process a3 a2 a3 a5 Process a5 a4 a6 a6 Transformation Choreography communication Distribution list Activity On-premise Cloud a1 X a2 X a3 X a4 X a5 X a6 X a2 Orchestration Cloud Process Figure 4. Schematic representation of the proposed business process transformation. decomposition in these papers has been to reduce the amount of data that needs to be exchanged between the participants and the orchestrator. By creating separate processes for each of the participants, direct communication between participants is enforced, instead of using the orchestrator as a mediator. This leads to better data throughput and less data communication over the network. In our case, the number of processes that need to be created is fixed, and the reason for decomposition is not only the reduction of data transfer between the cloud and the organization, but also the enforcement of security rules. We opted for a solution in which a business process is automatically transformed into separate processes. This transformation is guided by a distribution list, in which for each activity in the original process, the deployment location is defined. By using a transformation engine, we expect to obtain individual processes and a collaboration specification, in which the communication between the processes is described. Fig. 4 shows an overview of our approach. In order to realize this approach, we need to overcome some practical issues. First, we need to define transformation rules, in order to split up the monolithic business process. The newly created processes should be formally correct, to ensure that the behavior of the decomposed business process corresponds to the original business process. Second, business process monitoring will have to consider the distribution and collaboration of the processes. Normally, a monitoring tool monitors a single business process, but since the original business process is performed by multiple cooperating but individual processes, monitoring tools should be modified to monitor the business processes as if they were a single one. a4 IV. TRANSFORMATION Most work on the decomposition of business processes [8, 9, 10] focus on the implementation level of the BPM lifecycle, and define transformations at the level of BPEL processes. In these references, the choice of partitioning a business process is based on performance issues and therefore can be made by implementers. The choice of distributing data and activities in the cloud, however, is not only influenced by performance issues, but also by costs and governance rules. Therefore, the distribution decision may take place in the design phase of the BPM life-cycle. Instead of focusing on a specific language, we decided to use a more abstract model for our transformation. This gives us the advantage of purely focusing on the distribution problem, instead of also having to deal with languagespecific problems, such as the ones caused by Dead Path Elimination (DPE) [3], which determines the behavior of links in BPEL, and has been identified as a big challenge in the decomposition of BPEL processes. In each of the investigated decentralization approaches, data analysis has been performed to identify the data dependencies between the activities in a process. We also need to perform data analysis in order to assess the consequences of splitting up a process. Process transformations can be implemented using either graph transformations [11] or model-to-model transformations [12]. Model transformations are defined at metamodel level, i.e., in terms of abstract syntax. However, these transformations should result in semantically correct decompositions. In our particular case, the cooperation of the processes on-premise and in the cloud should have the same observable behavior as the original (monolithic) process. This means that either the transformations are correct by construction, or they are performed at semantic level, via auxiliary lifting and grounding transformations (from syntax to semantics and vice-versa, respectively). We propose to use an intermediate graph-based representation in which activities are represented by nodes, and control flow and data flow are explicitly modeled by the edges between the nodes. In addition, the structure should support conditional and parallel flows. After implementing the transformation on the graphbased model, we need to define two transformations for transforming a business process defined in a certain business process modeling language into our graph-based model and back (lifting and grounding, respectively). The lifting transformation gives us the opportunity to apply our approach on real business processes models, without having to convert the business process models manually to the intermediate model. A. Intermediate representation Our intermediate graph representation for describing business processes consists of different types of nodes and 168

5 Figure 5. personalinfo act1 rec flw eflw rep act2 act3 act4 video convertedvideo videoinfo Intermediate representation of business process. edges. Activity nodes represent the execution of single activities in the process. Communication nodes (invoke, receive and reply) are used to model either synchronous and asynchronous interactions between processes. The behavior of the communication nodes is comparable to the communication nodes in BPEL. Parallel behavior is modeled by using flow-nodes, which divide an execution path into several simultaneously executable branches. The end-flow node can be used for joining parallel branches. Conditional behavior is represented in the intermediate representation by if-nodes. An if-node has two outgoing branches, one which is executed in case the condition of the if-node yields true, and the other executed otherwise. Three types of edges are available: the control flows in the process are modeled by control edges. flows are modeled by using data edges. A data edge pointing from activity A1 to A2 means that A2 uses data, produced by activity A1. Communication edges pass control flow and data to other processes. Fig. 5 is an example of a business process graphically represented in the intermediate representation. In the example, control edges are represented by solid lines, data edges are represented by dashed lines and communication edges are represented by dotted lines. B. Transformation chain Our transformation process consists of three transformations: 1) A transformation from a business process defined in an existing business process language, such as BPEL or BPMN to our intermediate graph representation. flow analysis is performed on the business process to discover the data dependencies that exists between activities in the process. 2) A transformation from a business process defined in the intermediate graph representation and a distribution list, in which the deployment locations of activities and data are defined, to a a new instance of the intermediate graph model, in which nodes are distributed according to the locations defined in the distribution list. Communication between processes is modeled by using communication nodes and communication edges. 3) A transformation from the transformed intermediate representation to an executable business process and a collaborative model in which communication between the newly created processes is described. V. EXAMPLE In this section we give an example of a process that is decomposed into collaborating processes with different distribution destinations. The example is meant for illustrating the goal and working of our transformation framework. Consider a television broadcast organization that is searching for new television program formats. The organization uses an on-line system, in which users can submit their new program ideas. Users need to upload a short video, in which their idea is presented to the directors. Besides the video, users also need to upload their their personal information, so that the organization can reach the user, in case the directors are interested in the submitted idea. The uploaded videos are automatically converted to a specific format, so that directors can easily watch and compare uploaded video entries, without having to convert them manually. After the conversion, an analysis process is performed, which categorizes videos and collects general properties of the video, such as length, size and quality. The activities in which the video is converted and analyzed are computation-intensive operations and, therefore the organization wants to outsource these activities to the cloud. The organization also decides to store the videos in the cloud, since many storage resources might be needed to store all the videos. The user information needs to be stored within the borders of the organization, in order to assure privacy of user data. We omit here the transformation from original business process to the intermediate representation and back, and only discuss how the intermediate representation and distribution list are transformed into collaborating business processes. Fig. 5 shows the intermediate representation of the described example. The distribution list is shown in Table I. act2 and act3 have been marked to be performed in the cloud. Since these activities are sequentially executed, both activities can be moved as a sequence to a new process. In the original on-premise process, the nodes get replaced by a synchronous invocation node, which sends the video to the cloud process and waits until the video has been converted and analyzed. The cloud process sends the result 169

6 Table I DISTRIBUTION LIST FOR MARKING DISTRIBUTION LOCATIONS AND SETTING DATA RESTRICTIONS. Figure 6. Distribution list : act1 On-premise act2 Cloud act3 Cloud act4 On-premise restrictions: personalinfo On-premise personalinfo On-Premise Process act1 rec flw videoinfo eflw rep inv act4 video Cloud Process rec act2 act3 rep video convertedvideo videoinfo Intermediate representation of the transformed business process. of the analysis back to the on-premise process, which in turn, sends the received data to activity act4. By performing a data verification algorithm after the transformation, we can ensure that the newly created process does not violate any data constraints that were imposed by the distribution list. The result obtained after the transformation is shown in Fig. 6. The cloud process created during the transformation is indicated in Fig. 6. The other nodes together form the onpremise process. VI. RELATED WORK A workflow system that scales workflow tasks on the Amazon EC2 cloud has been presented in [13]. The paper describes a workflow system in which activities can be divided among different nodes. A load balancer is used for letting the system scale up and down according to the load of the workflow system. The paper does not take into account security measures for data protection, but mainly focuses on the scalability of the system and the distribution of activities. In a centralized orchestration, a process is coordinated by a single orchestrator. Decentralized orchestrations are distributed among several orchestrators. In centralized orchestrations, all the communication between services is performed by the orchestrator. By distributing parts of a process over separate orchestrators, the message overhead may be reduced, which leads to better response time and throughput [14]. Several research groups have investigated the possibility of decentralizing orchestrations. In [8, 14, 15], new orchestrations are created for each service that is used within the business process, hereby creating direct communication between services, instead of being coordinated by one single orchestrator. Business processes are defined in BPEL. In addition to the partitioning of business processes, also issues with synchronization and process completion with error handling are described. analysis is performed to identify the data dependencies between several nodes. The control dependencies and data dependencies are modeled in a Program Dependency Graph (PDG) [16]. The transformations are performed on PDGs and the newly created graphs are transformed back into BPEL. The partitioning approach is based on the observation that each service in the process corresponds to a fixed node and for each fixed node a partition is generated. In our approach we want to create processes in which multiple services can be used. This partitioning algorithm is therefore not suitable to our approach. In [9] a transformation of a business process into several new business processes for each participant within the process has been described. The of the described transformation is an extension to BPEL, called BPEL-D, in which datalinks between nodes are explicitly defined. In later work [17], transformation is suggested by using traditional BPEL as and additional data dependency information, which is collected by performing data analysis on the original process [18]. These papers devote most effort to how to deal with DPE (see Section IV), when transforming a business process into multiple individual entities. The transformation described in [9] is performed manually. The rules defined in the papers are not directly applicable to our approach. However, in the final step in which the intermediate representation is transformed to an actual business process language, the rules defined in [9] can be used as guidelines for implementing processes in which faults can be propagated along the control links of the process, to ensure completion of processes during execution. Decentralization of BPEL processes is addressed in [10]. A graph structure is used as intermediate model to describe BPEL processes. Graphs are used to model not only control flow, but also data flow. The transformation has been defined in terms of graph transformations. The paper introduces a type graph for defining graph transformations, but does not define the transformation rules. A type graph is the meta model graph, which is used to restrict transformations. The type graph presented in the paper can be used for defining our own transformation rules, since it contains the same concepts as our intermediate representation. The authors of [19] state that [8, 9] focus too much on the BPEL language to justify their approach in which decentralization is performed at an abstract level. By performing 170

7 data analysis on business processes, they generate data dependency tables, which in turn are used for transforming these business processes. VII. CONCLUSIONS In this paper we propose an approach to decompose a business process into multiple processes that are deployed on-premise and in the cloud, depending on performance and sensitivity requirements expressed as annotations on activities and data. We concluded that the automation of this approach requires business process decomposition techniques, and we investigated the theoretical and technical support already available for this sort of transformation. We are currently implementing our transformation, which is expected to be a component in a comprehensive (forthcoming) tool kit that should support business process annotation, automated transformation, deployment and monitoring. REFERENCES [1] M. Weske, Business Process Management: Concepts, Languages, Architectures. Springer, [2] M. P. Papazoglou, Web Services - Principles and Technology. Prentice Hall, [3] A. Alves, A. Arkin, S. Askary, B. Bloch, F. Curbera, Y. Goland, N. Kartha, Sterling, D. König, V. Mehta, S. Thatte, D. van der Rijn, P. Yendluri, and A. Yiu, Web Services Business Process Execution Language Version 2.0, OASIS Committee, [4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS , Feb [5] P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, vol. 53, no. 6, p. 50, [6] Y.-B. Han, J.-Y. Sun, G.-L. Wang, and H.-F. Li, A cloud-based bpm architecture with user-end distribution of non-compute-intensive activities and sensitive data, J. Comput. Sci. Technol., vol. 25, no. 6, pp , [7] T. Anstett, F. Leymann, R. Mietzner, and S. Strauch, Towards bpel in the cloud: Exploiting different delivery models for the execution of business processes, in Proceedings of the 2009 Congress on Services - I. Washington, DC, USA: IEEE Computer Society, 2009, pp [8] M. G. Nanda and N. Karnik, Synchronization analysis for decentralizing composite web services, in Proceedings of the 2003 ACM symposium on Applied computing, ser. SAC 03. New York, NY, USA: ACM, 2003, pp [9] R. Khalaf and F. Leymann, E role-based decomposition of business processes using bpel, in Proceedings of the IEEE International Conference on Web Services, ser. ICWS 06. Washington, DC, USA: IEEE Computer Society, 2006, pp [10] L. Baresi, A. Maurino, and S. Modafferi, Towards distributed bpel orchestrations, ECEASST, vol. 3, [11] L. Grunske, L. Geiger, A. Zndorf, N. V. Eetvelde, P. V. Gorp, and D. Varr, Using graph transformation for practical model driven software engineering, in Model-Driven Software Development - Volume II of Research and Practice in Software Engineering. Springer, [12] S. Kent, Model driven engineering, in Proceedings of the Third International Conference on Integrated Formal Methods, ser. IFM 02. London, UK, UK: Springer-Verlag, 2002, pp [13] T. Dornemann, E. Juhnke, and B. Freisleben, Ondemand resource provisioning for bpel workflows using amazon s elastic compute cloud, in Proceedings of the th IEEE/ACM International Symposium on Cluster Computing and the Grid, ser. CCGRID 09. Washington, DC, USA: IEEE Computer Society, 2009, pp [14] M. G. Nanda, S. Chandra, and V. Sarkar, Decentralizing execution of composite web services, in Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2004, J. M. Vlissides and D. C. Schmidt, Eds. Vancouver, BC, Canada: ACM, 2004, pp [15] G. B. Chafle, S. Chandra, V. Mann, and M. G. Nanda, Decentralized orchestration of composite web services, in Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters, ser. WWW Alt. 04. New York, NY, USA: ACM, 2004, pp [16] J. Ferrante, K. J. Ottenstein, and J. D. Warren, The program dependence graph and its use in optimization, ACM Trans. Program. Lang. Syst., vol. 9, no. 3, pp , Jul [17] R. Khalaf, O. Kopp, and F. Leymann, Maintaining data dependencies across bpel process fragments, in Proceedings of the 5th international conference on Service-Oriented Computing, ser. ICSOC 07. Berlin, Heidelberg: Springer-Verlag, 2007, pp [18] O. Kopp, R. Khalaf, and F. Leymann, Deriving explicit data links in ws-bpel processes, in Proceedings of the 2008 IEEE International Conference on Services Computing - Volume 2, ser. SCC 08. Washington, DC, USA: IEEE Computer Society, 2008, pp [19] W. Fdhila, U. Yildiz, and C. Godart, A flexible approach for automatic process decentralization using dependency tables, in ICWS, 2009, pp

BUSINESS PROCESS MANAGEMENT IN THE CLOUD WITH DATA AND ACTIVITY DISTRIBUTION

BUSINESS PROCESS MANAGEMENT IN THE CLOUD WITH DATA AND ACTIVITY DISTRIBUTION MASTER THESIS BUSINESS PROCESS MANAGEMENT IN THE CLOUD WITH DATA AND ACTIVITY DISTRIBUTION Evert F. Duipmans FACULTY OF ELECTRICAL ENGINEERING, MATHEMATICS AND COMPUTER SCIENCE SOFTWARE ENGINEERING EXAMINATION

More information

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival

More information

CMotion: A Framework for Migration of Applications into and between Clouds

CMotion: A Framework for Migration of Applications into and between Clouds Institute of Architecture of Application Systems CMotion: A Framework for Migration of Applications into and between Clouds Tobias Binz, Frank Leymann, David Schumm Institute of Architecture of Application

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

BPM in Cloud Architectures: Business Process Management with SLAs and Events

BPM in Cloud Architectures: Business Process Management with SLAs and Events BPM in Cloud Architectures: Business Process Management with SLAs and Events Vinod Muthusamy and Hans-Arno Jacobsen University of Toronto 1 Introduction Applications are becoming increasingly distributed

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

A Proposed Case for the Cloud Software Engineering in Security

A Proposed Case for the Cloud Software Engineering in Security A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,

More information

Geoprocessing in Hybrid Clouds

Geoprocessing in Hybrid Clouds Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;

More information

Enabling Execution of Service Workflows in Grid/Cloud Hybrid Systems

Enabling Execution of Service Workflows in Grid/Cloud Hybrid Systems Enabling Execution of Service Workflows in Grid/Cloud Hybrid Systems Luiz F. Bittencourt, Carlos R. Senna, and Edmundo R. M. Madeira Institute of Computing University of Campinas - UNICAMP P.O. Box 6196,

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

Conceptual Approach for Performance Isolation in Multi-Tenant Systems

Conceptual Approach for Performance Isolation in Multi-Tenant Systems Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and

More information

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing IJECT Vo l. 6, Is s u e 1, Sp l-1 Ja n - Ma r c h 2015 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Performance Analysis Scheduling Algorithm CloudSim in Cloud Computing 1 Md. Ashifuddin Mondal,

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Useful Patterns for BPEL Developers

Useful Patterns for BPEL Developers Central Page 457 of 493 Useful Patterns for BPEL Developers Darko Andročec, Dragutin Kermek Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 {darko.androcec, dragutin.kermek}@foi.hr

More information

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Winery A Modeling Tool for TOSCA-based Cloud Applications

Winery A Modeling Tool for TOSCA-based Cloud Applications Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University

More information

Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage

Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage 241 Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Patrick Bedué bedue@stud.uni-frankfurt.de Wenxia Han s0611400@stud.uni-frankfurt.de Mathias Hauschild s8722400@stud.uni-frankfurt.de

More information

Service allocation in Cloud Environment: A Migration Approach

Service allocation in Cloud Environment: A Migration Approach Service allocation in Cloud Environment: A Migration Approach Pardeep Vashist 1, Arti Dhounchak 2 M.Tech Pursuing, Assistant Professor R.N.C.E.T. Panipat, B.I.T. Sonepat, Sonipat, Pin no.131001 1 pardeepvashist99@gmail.com,

More information

Optimized and Secured Educlouds by Implementing Virtualization

Optimized and Secured Educlouds by Implementing Virtualization International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,

More information

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

Dynamic Composition of Web Service Based on Cloud Computing

Dynamic Composition of Web Service Based on Cloud Computing , pp.389-398 http://dx.doi.org/10.14257/ijhit.2013.6.6.35 Dynamic Composition of Web Service Based on Cloud Computing WU Nai-zhong Information Center, Changzhou Institute of Engineering Technology, Changzhou

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information

Privacy-Aware Scheduling for Inter-Organizational Processes

Privacy-Aware Scheduling for Inter-Organizational Processes Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria c.hochreiner@infosys.tuwien.ac.at Abstract Due to the

More information

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi

More information

A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment

A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment Jonathan Corley 1 and Eugene Syriani 2 1 University of Alabama, U.S.A. 2 Université de Montréal, Canada Abstract. We present the

More information

Cloud Computing: Technical Challenges and CloudSim Functionalities

Cloud Computing: Technical Challenges and CloudSim Functionalities Cloud Computing: Technical Challenges and CloudSim Functionalities Firas D. Ahmed 1, Amer Al Nejam 2 1 Universiti Tenaga Nasional, College of Information Technology, Jalan IKRAM-UNITEN, 43000 Kajang, Malaysia

More information

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance of

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

Business Process Management in the cloud: Business Process as a Service (BPaaS)

Business Process Management in the cloud: Business Process as a Service (BPaaS) University of Twente Literature Study Business Process Management in the cloud: Business Process as a Service (BPaaS) Author: Evert Duipmans Supervisor: Dr. Luís Ferreira Pires April 1, 2012 Contents 1

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model

More information

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems Aysan Rasooli Department of Computing and Software McMaster University Hamilton, Canada Email: rasooa@mcmaster.ca Douglas G. Down

More information

Service Component Architecture for Building Cloud Services

Service Component Architecture for Building Cloud Services Service Component Architecture for Building Cloud Services by Dr. Muthu Ramachandran, Principal Lecturer in the Computing and Creative Technologies School Abstract: The emergence of cloud computing has

More information

Security Aspects of Cloud Computing

Security Aspects of Cloud Computing Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION Marek Rychlý and Petr Weiss Faculty of Information Technology, Brno University of Technology, Czech Republic, rychly@fit.vutbr.cz,

More information

Agent Based Framework for Scalability in Cloud Computing

Agent Based Framework for Scalability in Cloud Computing Agent Based Framework for Scalability in Computing Aarti Singh 1, Manisha Malhotra 2 1 Associate Prof., MMICT & BM, MMU, Mullana 2 Lecturer, MMICT & BM, MMU, Mullana 1 Introduction: Abstract: computing

More information

From mini-clouds to Cloud Computing

From mini-clouds to Cloud Computing From mini-clouds to Cloud Computing Boris Mejías, Peter Van Roy Université catholique de Louvain Belgium {boris.mejias peter.vanroy}@uclouvain.be Abstract Cloud computing has many definitions with different

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Model-Driven Cloud Data Storage

Model-Driven Cloud Data Storage Model-Driven Cloud Data Storage Juan Castrejón 1, Genoveva Vargas-Solar 1, Christine Collet 1, and Rafael Lozano 2 1 Université de Grenoble, LIG-LAFMIA, 681 rue de la Passerelle, Saint Martin d Hères,

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

SHORT VERSION, NO EXAMPLE AND APPENDIX 1. (MC 2 ) 2 : A Generic Decision-Making Framework and its Application to Cloud Computing

SHORT VERSION, NO EXAMPLE AND APPENDIX 1. (MC 2 ) 2 : A Generic Decision-Making Framework and its Application to Cloud Computing SHORT VERSION, NO EXAMPLE AND APPENDIX 1 (MC 2 ) 2 : A Generic Decision-Making Framework and its Application to Cloud Computing Michael Menzel, FZI Forschungszentrum Informatik Karlsruhe, menzel@fzi.de

More information

Cloud Deployment Patterns: Migrating a Database Driven Application to the Cloud using Design Patterns

Cloud Deployment Patterns: Migrating a Database Driven Application to the Cloud using Design Patterns , October 21-23, 2015, San Francisco, USA Cloud Deployment Patterns: Migrating a Database Driven Application to the Cloud using Design Patterns A.A. Adewojo, J.M. Bass and K.Hui, I.K. Allison Abstract

More information

P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net

P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net , pp.191-200 http://dx.doi.org/10.14257/ijgdc.2015.8.2.18 P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net Xuemin Zhang, Zenggang Xiong *, Gangwei Wang, Conghuan Ye and

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications

Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim Abstract In Hadoop MapReduce distributed file system, as the input

More information

An Anonymization-Based Approach For Privacy-Preserving BPaaS

An Anonymization-Based Approach For Privacy-Preserving BPaaS Cloud Intelligence A VLDB 2012 Workshop An Anonymization-Based Approach For Privacy-Preserving BPaaS Mehdi Bentounsi, S. Benbernou, M.J. Atallah and C. Deme Université Paris Descartes, France mehdi.bentounsi@parisdescartes.fr.

More information

An Approach Towards Customized Multi- Tenancy

An Approach Towards Customized Multi- Tenancy I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy

More information

Understanding the Cloud: Towards a Suitable Cloud Service

Understanding the Cloud: Towards a Suitable Cloud Service International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Understanding the Cloud: Towards a Suitable Cloud Service Huda S. Alrowaihi Computer Information Systems,

More information

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers Rostand Costa a,b, Francisco Brasileiro a a Federal University of Campina Grande Systems and Computing Department, Distributed

More information

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes

More information

Nessus or Metasploit: Security Assessment of OpenStack Cloud

Nessus or Metasploit: Security Assessment of OpenStack Cloud Nessus or Metasploit: Security Assessment of OpenStack Cloud Aleksandar Donevski, Sasko Ristov and Marjan Gusev Ss. Cyril and Methodius University, Faculty of Information Sciences and Computer Engineering,

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

MDE Opportunities in Multi-Tenant Cloud Applications

MDE Opportunities in Multi-Tenant Cloud Applications MDE Opportunities in Multi-Tenant Cloud Applications Mohammad Abu Matar 1 and Jon Whittle 2 1 Etisalat British Telecom Innovation Center Khalifa University of Science, Technology and Research Abu Dhabi,

More information

How To Understand The Individual Competences Of An It Manager

How To Understand The Individual Competences Of An It Manager ORGANIZATIONS ARE GOING TO THE CLOUD: WHICH COMPETENCES FOR THE IT MANAGER? Luca Sabini, Stefano Za, Paolo Spagnoletti LUISS Guido Carli University Rome Italy {lsabini, sza, pspagnoletti}@luiss.it ABSTRACT

More information

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Cloud Template, a Big Data Solution

Cloud Template, a Big Data Solution Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA MBahrami@UCMerced.edu Abstract. Today cloud computing has become

More information

Portable Cloud Services Using TOSCA

Portable Cloud Services Using TOSCA Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University

More information

This paper defines as "Classical"

This paper defines as Classical Principles of Transactional Approach in the Classical Web-based Systems and the Cloud Computing Systems - Comparative Analysis Vanya Lazarova * Summary: This article presents a comparative analysis of

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Cloud Computing: The Next Revolution in IT

Cloud Computing: The Next Revolution in IT Leymann 3 Cloud Computing: The Next Revolution in IT FRANK LEYMANN, Stuttgart ABSTRACT Cloud computing provides a new mode of use and of offer of IT resources. Such resources can be used on demand by anybody

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies

More information

Towards an Agent-Based Augmented Cloud

Towards an Agent-Based Augmented Cloud Paper Towards an Agent-Based Augmented Cloud Roman Dębski, Aleksander Byrski, and Marek Kisiel-Dorohinicki Department of Computer Science, AGH University of Science and Technology, Kraków, Poland Abstract

More information

Keywords Cloud computing, virtual machines, migration approach, deployment modeling

Keywords Cloud computing, virtual machines, migration approach, deployment modeling Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Scheduling

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in

More information

Implementing Hybrid Cloud at Microsoft

Implementing Hybrid Cloud at Microsoft Implementing Hybrid Cloud at Microsoft Published September 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed as reference documentation

More information

A DSL-based Approach to Software Development and Deployment on Cloud

A DSL-based Approach to Software Development and Deployment on Cloud 2010 24th IEEE International Conference on Advanced Information Networking and Applications A DSL-based Approach to Software Development and Deployment on Cloud Krzysztof Sledziewski 1, Behzad Bordbar

More information

10 Years of Hype Cycles - Do We Forget Knowledge?

10 Years of Hype Cycles - Do We Forget Knowledge? 10 Years of Hype Cycles - Do We Forget Knowledge? Aaron McConnell Research Scientist IU-ATC School of Computing and Information Engineering University of Ulster at Coleraine Northern Ireland Aaron McConnell

More information

How to Optimize a Cloud Service For Different Customers?

How to Optimize a Cloud Service For Different Customers? 2010 IEEE 3rd International Conference on Cloud Computing A Framework for Optimized Distribution of Tenants in Cloud Applications Christoph Fehling, Frank Leymann, Ralph Mietzner Institute of Architecture

More information

SLA Business Management Based on Key Performance Indicators

SLA Business Management Based on Key Performance Indicators , July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account

More information

Methodology and Framework of a Cloud-Based Prognostics and Health Management System for Manufacturing Industry

Methodology and Framework of a Cloud-Based Prognostics and Health Management System for Manufacturing Industry A publication of VOL. 33, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Editors: Enrico Zio, Piero Baraldi Copyright 2013, AIDIC Servizi S.r.l., ISBN 978-88-95608-24-2; ISSN 1974-9791 The Italian Association

More information

How To Understand Cloud Computing

How To Understand Cloud Computing International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol4, Issue3, 2013, pp234-238 http://bipublication.com CURRENT SCENARIO IN ARCHITECT AND APPLICATIONS OF CLOUD Doddini

More information

Security Analyzing in UNIX for Cloud Computing Environment

Security Analyzing in UNIX for Cloud Computing Environment Security Analyzing in UNIX for Cloud Computing Environment Yashwant Singh Chouhan 1, Makhan Kumbhkar 2 1 Professor, Dept. of Comp Science & Elex, Devi Ahilya Vishwavidyalaya, Indore, MP, India 2 Assistant

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

It s All About Cloud Key Concepts, Players, Platforms And Technologies

It s All About Cloud Key Concepts, Players, Platforms And Technologies It s All About Cloud Key Concepts, Players, Platforms And Technologies 3-day seminar Description Cloud computing has gained a lot of attention in recent years. It has mostly been used for non business

More information

Oracle Cloud Computing Strategy

Oracle Cloud Computing Strategy Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Facilitating Consistency Check between Specification and Implementation with MapReduce Framework

Facilitating Consistency Check between Specification and Implementation with MapReduce Framework Facilitating Consistency Check between Specification and Implementation with MapReduce Framework Shigeru KUSAKABE, Yoichi OMORI, and Keijiro ARAKI Grad. School of Information Science and Electrical Engineering,

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information